protection level
Recently Published Documents


TOTAL DOCUMENTS

214
(FIVE YEARS 88)

H-INDEX

12
(FIVE YEARS 3)

Author(s):  
Hussein Abdulameer Abdulkadhim ◽  
Jinan Nsaif Shehab

Although variety in hiding methods used to protect data and information transmitted via channels but still need more robustness and difficulty to improve protection level of the secret messages from hacking or attacking. Moreover, hiding several medias in one media to reduce the transmission time and band of channel is the important task and define as a gain channel. This calls to find other ways to be more complexity in detecting the secret message. Therefore, this paper proposes cryptography/steganography method to hide an audio/voice message (secret message) in two different cover medias: audio and video. This method is use least significant bits (LSB) algorithm combined with 4D grid multi-wing hyper-chaotic (GMWH) system. Shuffling of an audio using key generated by GMWH system and then hiding message using LSB algorithm will provide more difficulty of extracting the original audio by hackers or attackers. According to analyses of obtained results in the receiver using peak signal-to-noise ratio (PSNR)/mean square error (MSE) and sensitivity of encryption key, the proposed method has more security level and robustness. Finally, this work will provide extra security to the mixture base of crypto-steganographic methods.


Author(s):  
jie zhang ◽  
Lin Zhao ◽  
Fuxin Yang ◽  
Liang Li ◽  
Xiaosong Liu ◽  
...  

Abstract Integrity monitoring of precise point positioning (PPP) can provide tightly guaranteed absolute position error bounds for safety-critical applications. However, complex local environment makes PPP integrity monitoring much more challenging, such as urban canyons. Significant prone multipaths and low observation redundancy are main difficulties to the accuracy and the reliability of PPP. Therefore, we proposed a solution separation-based integrity monitoring algorithm, which is based on a single and dual frequency-mixed undifferenced and uncombined PPP model considering compensation for the multipath error distortion by Gaussian overbounding. Both the static and the kinematic data are utilized to test the proposed algorithm. The results show that the proposed algorithm can produce adequate protection level in horizontal and vertical directions. Furthermore, the proposed algorithm can obtain smoother protection level and positioning error under the dynamic local environment, and effectively suppress the misleading information.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

This paper studies the impact of software protection level on software platforms and customers’ responses to different levels of protection. This study models the interplay between users, developers and platforms, and the impact of quality degradation in the presence and absence of competitive platforms. All price structures are affected by protection level and quality degradation level for pirated copies of software. Customers, developers, and platform reaction to the protection and quality degradation levels can be contradictory, because an increase in those parameters may benefit one side, while hindering another. The results confirm that full protection against piracy is not always the best strategy in multisided platforms, but the impact of piracy changes under different scenarios.The results show that decisions regarding optimal security strategies should be taken in a systematic manner by incorporating the perspectives of all involved parties and the important factors extracted from the market within which the platform performs, such as monopoly or competition.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Xuchen Deng

This paper studies the location-routing problem of emergency facilities with time window under demand uncertainty. We propose a robust mathematical model in which uncertain requirements are represented by two forms: the support set defined by cardinal constraint set. When the demand value of rescue point changes in a given definition set, the model can ensure the feasibility of each line. We propose a branch and price cutting algorithm, whose pricing problem is a robust resource-constrained shortest path problem. In addition, we take the Wenchuan Earthquake as an example to verify the practicability of the method. The robust model is simulated under different uncertainty levels and distributions and compared with the scheme obtained by the deterministic problem. The results show that the robust model can run successfully and maintain its robustness, and the robust model provides better protection against demand uncertainty. In addition, we find that cost is more sensitive to uncertainty level than protection level, and our proposed model also allows controlling the robustness level of the solution by adjusting the protection level. In all experiments, the cost of robustness is that the routing cost increases by an average of 13.87%.


2021 ◽  
Vol 14 (2) ◽  
pp. 14-20
Author(s):  
Abdullah Abdullazeez Sheehan ◽  
Mohammed Khudor ◽  
Fanar Isihak

It is very important, before starting the manufacture of any vaccine from any microorganism estimation of LD₅₀ of that microorganism to determine their pathogenicity and virulence. Estimated LD₅₀ was very important to be used in challenge tests later to estimate the protection level of the manufactured vaccine in experimental animals. So, this study was aimed to estimate LD₅₀ of local methicillin-resistant Staphylococcus aureus (MRSA) bacterial isolate. A pilot study has been done to determine approximately LD₅₀ of used MRSA in the study by using different bacterial concentrations of MRSA to determine approximate LD₅₀ that can be able to kill half numbers of animals used in the study to be used later in the estimation of exact LD₅₀ by using of Up-and-Down method. Ninety Wistar albino rats have been used for this purpose, eighty-four animals which divided into fourteen groups by six animals for each group (for pilot study) and remained six animals for (Up-and-Down method). The results showed that 9 X 10¹⁰ CFU/ml was led to killing half number of animals used in the study, this dose has been used as starting dose in the Up-and-Down method to the estimation of the exact LD₅₀ dose. The results showed that 5.526 X 10¹⁰ CFU/ml was the exact LD₅₀ of local MRSA isolate, which will be used later in the challenge test to estimate the protection level of a locally prepared vaccine against MRSA isolate.


2021 ◽  
Vol 1 (4) ◽  
pp. 704-743
Author(s):  
Moses Ashawa ◽  
Sarah Morris

The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily. While malware classification and detection tools are being developed to fight malware infection, hackers keep deploying different infection strategies, including permissions usage. Among mobile platforms, Android is the most targeted by malware because of its open OS and popularity. Permissions is one of the major security techniques used by Android and other mobile platforms to control device resources and enhance access control. In this study, we used the t-Distribution stochastic neighbor embedding (t-SNE) and Self-Organizing Map techniques to produce a visualization method using exploratory factor plane analysis to visualize permissions correlation in Android applications. Two categories of datasets were used for this study: the benign and malicious datasets. Dataset was obtained from Contagio, VirusShare, VirusTotal, and Androzoo repositories. A total of 12,267 malicious and 10,837 benign applications with different categories were used. We demonstrate that our method can identify the correlation between permissions and classify Android applications based on their protection and threat level. Our results show that every permission has a threat level. This signifies those permissions with the same protection level have the same threat level.


2021 ◽  
pp. 110-135
Author(s):  
Anastasiya Morsanova

This article addresses possible structural alternatives for the dissemination of the results of intellectual activity (RIA), which reflect setting of optimal price and level of technical protection. The paper argues that digital piracy is not always a negative factor for the author or copyright owner but may be a signal indicating an inefficiently of RIA distributing method. The developed model demonstrates the choice of RIA distribution strategy depending on various factors: author's popularity, the difference in quality between the original RIA and pirated copy, legal protection level. The findings regarding the possibilities of combining legal and technical protection, consumer behavior and the positive effects of digital piracy will help the regulator to apply more effective measures. The article is written on the basis of the RANEPA state assignment research program.


2021 ◽  
Vol 21 (4) ◽  
pp. 77-85
Author(s):  
Seho Choi ◽  
◽  
Haengrok Oh ◽  
Joobeom Yun

Sign in / Sign up

Export Citation Format

Share Document